08:45 - 09:30 | Arrival & Registration
09:30 - 10:00 | Commencement & Introductory Speeches
Costas Papadatos – President of (ISC)2 Hellenic Chapter
Costas Tritsaris – Marketing Director, ISACA Athens Chapter
10:00 - 12:00 | 1st Session: Develop a Strategic Plan for Enterprise Data Protection
During planning and implementing a roadmap for the development of IT infrastructures and applications in an organization, the security parameter for data protection is of vital importance and requires a strategic approach, while focusing on technologies, people and procedures. Companies that provide counsel, checks and implementation of digital security projects, have a very important part to play in shaping and integrating this plan in any organization. Representatives of such companies, as well as IT managers, will highlight the optimal practices for digital security plans and projects, in this session.
Security and Integrity of Networks and Services for Electronic Communications
Ioannis Psalidas – Head of Department for Securing Infrastructures and Privacy for Internet Services and Applications, Hellenic Authority for Communication Security and Privacy
Managed Detection and Response: A new class of solutions using IBM QRadar
Thomas Ailianos – SOC Senior Security Engineer, ENCODE
How to create an effective Information Security Program
Dimitris Mouzakitis – Manager, Governance, Compliance and Risk Management, Odyssey
Culture of No & Shadow IT
Christina Boura – Section Manager of IT Systems Security, Public Power Corporation
Advanced Persistent Threat: Non-Virtual Threats and ways to deal with them
Nikitas Kladakis -Information Security Director, Netbull
Assessing GDPR Implications, Challenges and Opportunities
Panos Moraitis – CEO, Aspida Cyber Security
GDPR & Cyber Insurance
Nikos Georgopoulos – Cyber Privacy Risks Advisor, Cromar coverholder at Lloyd’s
Security for the Connected Vessel
Nikos Kallergis, Network Engineer, Inttrust
Moderator: Vlasis Amanatides, Journalist
12:00 - 12:30 | Break
12:30 - 14:30 | 2nd Session: Intelligent Security Made Simple
One of the most significant things businesses today demand from companies that provide security solutions and services, are for protection products installed on their IT ecosystems to offer security for one, and also be able to align as a whole with operational functions, supporting productivity and application flexibility. Smart solutions that offer effective protection from current and future threats, through a simple way and unified approach, that remove complexity and align with the demands of any organization, will be presented in this session of the conference.
When your toys attack – Securing the IoT is harder than it looks
Chester Wisniewski – Senior Security Advisor, Sophos
Barracuda – Securing Servers on Microsoft Azure
Sotiris Sarantos – Channel Manager, Digital Sima
Evangelos Kapsalakis – Solution Specialist, Cloud Infrastructure, Microsoft
From a Reactive Security to Proactive Hunting – Endpoint & Intelligence the new security pillars
David Grout – Technical Director South Emea, Fireeye
Identify and eliminate insider threats
Andreas Lalos – Professional Services Director, BESECURE
Arik Kasha – Regional Sales Director, ObserveIT
Trend Micro XGen – Are you ready for the Revolution in Endpoint Security?
Mehmet Dagdevirenturk – Channel Manager, Trend Micro
RAPID7: Transforming Data Into Insight
Harry Pylarinos – Systems Engineer, Naftomar Shipping and Trading
Make Cloud your Security Angel
Panagiotis Kouris– CEO, Office Line
Manos Pepis – CEO, Creative Ideas
Data Protection Beyond the Perimeter
Luis Angel del Valle – Chief Executive Officer and Co-founder, SealPath
Moderator: Vangelis Xanthakis, Journalist
14:30 - 15:00 | Break
15:00 - 16:30 | 3rd Session: Hands-on Ethical Hacking and Network Defense
The need for security professionals to understand the ways and delve into the techniques that attackers use to hack and break into networks, is ever more important. The skills, know-how, creativity and experience of Ethical Hackers (aka White Hats), can address this need, by detecting vulnerabilities on a network, and contributing in the enhancement of defensive mechanisms. In the final session of this year’s InfoCom Security Conference, scientists and researchers will present practical tools and methods that aim to control security in IT infrastructures, and as such, the protection of information.
CodeBreakers Bletchley Park
Panos Oplopoios – Journalist, Electronic Engineer, Consultant about Digital Technology at Ministry of Tourism
Training the next generation of penetration testers
Constantinos Papachristofis – Educational ICT Consultant/Instructor Security Expert (CCNP Sec), InterLei
Evolution of APTs
Thanasis Diogos – Board member – (ISC)2 Hellenic Chapter
Digital Evidence: Management, actions and thoughts
Ioannis Paschos – Examiner of digital evidence, Legal Expert
Killing Passwords: Strong Authentication Beyond the Password Era using ReCRED
Dr. Christopher Dandoyan – Research Associate, Digital Systems Department, University of Piraeus
European Cyber Security Team 2017- Putting together the national team of 2017.
Talents of today… professionals of tomorrow!
Christos Xenakis – Associate Professor, Digital Systems Department, University of Piraeus
Moderator: Giannis Rizopoulos, Journalist
Awarding the Winner of the Ethical Hacking Contest